Spam E-mails By Jessica Romero CS-301. Spam E-mails Spam emails? Spam emails? Is unsolicited and promotional email sent to in bulk to multiple users.

Slides:



Advertisements
Similar presentations
IS SPAM ETHICAL? ETHICAL REFECTIONS ON THE PROBLEM OF SPAM... Sudharsan Chandrashekaran.
Advertisements

What is Spam  Any unwanted messages that are sent to many users at once.  Spam can be sent via , text message, online chat, blogs or various other.
E-Business Technologies BCM SPAM Rafael Quiroz Vázquez Professor Eduard Heindl.
A Gift of Fire, 2edChapter 10: Professional Ethics and Responsibilities1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Ethics & Corporate Social Responsibility. A Case for Companies to be Socially Responsible  A company is a corporate citizen—it should act as a responsible.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Spyware and Spamware By Melissa Borri. Spamware… Spamware is unsolicited bulk that is designed to disguise the origin of any bulk it sends.
December 6, 1999Computer Science Human Centered Computing1 CS Final Presentation E-Commerce Comparison and its Future Steve Hu.
MIT Info Group, January 19, 2005 Page 1 The CAN-SPAM Act and what it means for MIT communicators MIT Info Group, January 19, 2005 Marsha Sanders Senior.
Ethical Issues in Marketing, Advertising & Product Safety
AND SPAM BY OLUWATOBI BAKARE
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Ethics & Social Responsibility
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
CCT356: Online Advertising and Marketing Class 2: Marketing/Online Advertising.
Jeopardy Chatting with strangers Spam and other viruses Security and Privacy Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final.
CS 4001Mary Jean Harrold1 Class 24 ŸFreedom of speech in cyberspace ŸAssign ŸAssignment 8—due today ŸTerm paper—due 11/20.
Department of Computer Sciences The University of Texas at Austin Zmail : Zero-Sum Free Market Control of Spam Benjamin J. Kuipers, Alex X. Liu, Aashin.
The Global Context Lecture 10 Global Corporate Social Responsibility.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
Employee Guidelines for Acceptable Use of Technology Resources.
Making Ethical Decisions and Managing a Socially Responsible Business Chapter 2 *includes other resources.
Dangers of the Internet CEL : C O M P U T E R S I N E V E R Y D A Y L I F E CEL 1 Dangers of the Internet Name: ____________________ Class: ________________.
Computer Ethics. 2 Networking * The Internet is a network of networks that uses two protocols, known as TCP/IP, to control the exchange of data. * The.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Online Marketing communications. Learning Objectives Identify the major forms of online marketing communications Discuss the ways in which a Web site.
Chapter 3 Technological, Legal, and Ethical Considerations 3.
Internet Advertising David HinojosaKelly Hodges. Internet Advertising Online advertising is a form of promotion that uses the internet to deliver marketing.
UTILITARIAN THEORY Presentation prepared by Jill Stiemsma LP: Ethical Theories Presentation Section: Monday, 8:30 August 14, 2007.
Utilitarianism or Consequentialism Good actions are those that result in good consequences. The moral value of an action is extrinsic to the action itself.
Justice John Stuart Mill. British Philosopher 1806 – 1873 Most Famous Works: Utiliarianism deals with ethics. On Liberty deals with political philosophy.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Consequentialism Is it OK to inflict pain on someone else? Is it OK to inflict pain on someone else? What if it is a small amount of pain to prevent a.
Policy Considerations RUCUS BOF IETF 71 - Philadelphia March 10, 2005 John Morris.
 Introduction to Computing  Computer Programming  Terrorisom.
Introduction Spam in Society Spam IM Spam Text Spam Blog Spamming Spam Blogs.
Online Services. Advertising & Marketing Big supermarket companies use lots of different ways of “saving money!” Different ways includes Tesco’s Clubcard,
ONLINE SERVICES ADVERTISING. ONLINE ADVERTISING Search Engine Results Pages Companies register with large search engines so that their websites appear.
Managerial Ethics & Corporate Social Responsibility
A Universal Moral Theory Dennis R. Cooley Department of History North Dakota State University 19 January 2003 Supported by a USDA/CSREES/IFAFS grant, “Consortium.
The Online World ONLINE ADVERTISING BTEC IC&T – LEVEL 2.
Freedom of Speech Computers in the World.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
SPAM: A PROBLEM IN NEED OF FEDERAL LEVEL REGULATION Linda Nagel Cyberlaw Fall 2002 November 4, 2002.
Ethics and Morality Theory Part 3 13 September 2006.
Things Every Computer User Should Know… Jessica Johnsey ED 505- Technology and Education.
Professional Ethics and Responsibilities
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
“We Can Stop the Spam” By: Jack P. McHugh Power Point Presented by: Ian Carey.
CHAPTER Section 5.1 Ethical Business Behavior Section 5.2 Socially Responsible Business & Philanthropy Ethics & Social Responsibility.
Spam By Dan Sterrett. Overview ► What is spam? ► Why it’s a problem ► The source of spam ► How spammers get your address ► Preventing Spam ► Possible.
Tips to Avoid Online Scams. About Several threats are there which spreads on every computer system just to infect each system with their harmful ways.
THE RULES OF THE ULTIMATUM GAME 1. The Referee gives some money, say $10, to the Proposer. 2. The Proposer may offer any amount $X, between $1 and $10,
Advertisements & Ad Blocking Technology By: Daniel Jackson.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. WHAT IS SPAM? Spam in unsolicited message NTM Microsoft Apple.
MBA 641 Business and Labor Law
Basic Principles: Ethics and Business
Ethical approaches to the harm reduction debate: “Virtue ethics as an alternative to deontological and consequential reasoning in the harm reduction debate”
Ethical Considerations
What is it? Why do I keep getting from Barracuda? SPAM.
Edexcel BTEC Level 2 First Information and Creative Technology
By Laith Qabbani Mohannad Al-Raie
OBE 117 BUSINESS AND SOCIETY.
BENEFICENCE “BENE” + “FACERE” = DO GOOD
John Stuart Mill Born: May 20, 1806, Pentonville, London, United Kingdom Died: May 8, 1873, Avignon, France Spouse: Harriet Taylor Mill (m. 1851–1858)
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Should we legalize drugs?
Basic Principles: Ethics and Business
Presentation transcript:

Spam s By Jessica Romero CS-301

Spam s Spam s? Spam s? Is unsolicited and promotional sent to in bulk to multiple users. Is unsolicited and promotional sent to in bulk to multiple users. Receiving s by an unknown sender is considerer spam? Receiving s by an unknown sender is considerer spam? No because sometimes we get non-personal from organizations which you have make a donation, online vendors you have used. No because sometimes we get non-personal from organizations which you have make a donation, online vendors you have used.

Spam s Are Spam s ethical or unethical? Are Spam s ethical or unethical? Why Marketing uses spam s to advertise? Why Marketing uses spam s to advertise? Why a user needs to use filter in their s to avoid spam s? Why a user needs to use filter in their s to avoid spam s?

Spam s Fake products or information Fake products or information Spam consumes valuable computer resources. Spam consumes valuable computer resources. Spam is an abuse of the system. Spam is an abuse of the system. Make you pay extra money. Make you pay extra money.

Spam s Conclusion. Conclusion. Utilitarian : Spam is immoral because does not respect individual users as a persons. Utilitarian : Spam is immoral because does not respect individual users as a persons. Spam s are harmful, harmful is not permitted by Harm principle of John Mill’s. Spam s are harmful, harmful is not permitted by Harm principle of John Mill’s. Harm Principle: the only acceptable reason for interfering with individual liberty is to prevent harm to others. Harm Principle: the only acceptable reason for interfering with individual liberty is to prevent harm to others. Deontology states that what is important is the motivation or intention for an action. Deontology states that what is important is the motivation or intention for an action.